Last Updated: September 27, | Applicable Hub Versions: All
Due to security concerns (see below for details), Planview has decided to deprecate all uses of NTLM within the Flow Fabric connectors on October 1, 2023.
Specifically, this affects the following connectors, and only connections to on-premise instances:
All connectors do support alternative authentication methods.
In most cases, the deprecation will be completely transparent. In rare cases, repositories may be configured to only support NTLM based authentication. You are able to verify this using a new option introduced in the connections screens of the affected connectors as follows:
Our support team will be able to extend the usage of NTLM on a case by case basis for a short period of time in the rare case that repositories only support NTLM based authentication, and more time is needed to add support for more secure authentication methods. Please contact our support team if necessary.
NTLM is an authentication protocol — a defined method for helping determine whether a user who’s trying to access an IT system really is actually who they claim to be.
NTLM doesn’t send passwords directly over the network - instead it sends a password hash. A password hash is created by a hashing algorithm - a function that transforms a password into a different string of characters. The function is repeatable: the same password will always generate the same hash. It’s also one-way: it’s easy to transform a password into a hash, but there’s no way to transform the hash back into the password.
NTLMv1 is a very weak authentication protocol by today’s standards. And while v2 is much more secure than v1, it’s still not nearly as secure as more modern protocols.
Because of the weak encryption standards used in both NTLMv1 and NTLMv2, it is possible for a malicious actor to use brute force methods to determine the password from the hash. As a result, even in a fully patched system, NTLMv1 and NTLMv2 authentication are vulnerable to various malicious attacks, including SMB replay, man-in-the-middle attacks, and brute force attacks.